References
- Agyepong, S., & Twinomurinzi, H. (2016, June 12–15). Facilitating financial inclusion using ICT : Lessons from M-Pesa and E-Zwich. Twenty-Fourth European Conference on Information Systems (ECIS), Istanbul, Turkey.
- Al-Khouri, A. M. (2007). UAE national ID programme case study. International Journal of Social Sciences, 1(2), 62–69.
- Boell, S. K., & Cecez-Kecmanovic, D. (2014). A hermeneutic approach for conducting literature reviews and literature searches. Communication of the Association for Information Systems, 34(12), 257–286. https://doi.org/10.17705/1cais.03412
- Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Psychiatric Quarterly, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa
- Braun, V., & Clarke, V. (2019). Reflecting on reflexive thematic analysis. Qualitative Research in Sport, Exercise and Health, 11(4), 589–597. https://doi.org/10.1080/2159676X.2019.1628806
- Braun, V., Clarke, V., & Hayfield, N. (2019). ‘A starting point for your journey, not a map’: Nikki Hayfield in conversation with Virginia Braun and Victoria Clarke about thematic analysis. Qualitative Research in Psychology. https://doi.org/10.1080/14780887.2019.1670765
- Breckenridge, K. (2010). The world’s first biometric money: Ghana’s e-Zwich and the contemporary influence of South African biometrics. Africa: The Journal of the International African Institute, 80(4), 642–662. https://doi.org/10.3366/afr.2010.0406
- Breckenridge, K. (2019). The failure of the ‘single source of truth about Kenyans: The NDRS, collateral mysteries and the Safaricom monopoly. African Studies, 78(1), 91–111. https://doi.org/10.1080/00020184.2018.1540515
- Chandra, A., & Calderon, T. (2005). Challenges and constraints to the diffusion of biometrics in information systems. Communications of the ACM, 48(12), 101–106. https://doi.org/10.1145/1101779.1101784
- Creswell, J. (2013). Qualitative, quantitative, and mixed methods approaches. Research design. London: Sage Publications.
- Davidson, E., & Chismar, W. G. (2007). The interaction of institutionally triggered and technology-triggered social structure change: An investigation of computerized physician order entry. MIS Quarterly, 31(4), 739–758. https://doi.org/10.2307/25148818
- Debrah, E., Effah, J., & Owusu-Mensah, I. (2019). Does the use of a biometric system guarantee an acceptable election’s outcome? Evidence from Ghana’s 2012 election. African Studies, 78(3), 347–367. https://doi.org/10.1080/00020184.2018.1519335
- Donovan, K. P. (2015). The biometric imaginary: Bureaucratic technopolitics in post-apartheid welfare. Journal of Southern African Studies, 41(4), 815–833. https://doi.org/10.1080/03057070.2015.1049485
- Effah, J., & Debrah, E. (2018). Biometric technology for voter identification: The experience in Ghana. Information Society, 34(2), 104–113. https://doi.org/10.1080/01972243.2017.1414720
- Effah, J., Owusu-oware, E., & Boateng, R. (2020). Biometric identification for socioeconomic development in Ghana. Information Systems Management, 37(2), 136–149. https://doi.org/10.1080/10580530.2020.1732528
- Engeström, Y. (1999). Expansive visibilization of work : An activity-theoretical perspective. Computer Supported Cooperative Work, 8(1), 63–93. https://doi.org/10.1023/A:1008648532192
- Gelb, A., & Clark, J. (2013). Identification for development: The biometrics Revolution (CGD working paper). Wahshington, DC: Centre for Global Development.
- Gelb, A., & Diofasi, A. (2016). Biometric elections in poor countries: Wasteful or a worthwhile investment? (Working paper, Vol. 435).
- Gelb, A., & Metz, A. D. (2017). Identification revolution: Can digital ID be harnessed for development? Wahshington, DC: Centre for Global Development.
- Islam, S., & Grönlund, Å. (2010). The Bangladesh national biometric database: A transferable success? In K. N. Andersen, T. van, E. Francesconi, & A. Gronlund (Eds.), Proceedings of international conference on Electronic Government and the Information Systems Perspective, Bilbao, Spain (Vol. 6267 LNCS, pp. 189–203).
- Iyamu, T., & Shaanika, I. (2019). The use of activity theory to guide information systems research. Education and Information Technologies, 24(1), 165–180. https://doi.org/10.1007/s10639-018-9764-9
- Jain, A., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), 90–98. https://doi.org/10.1145/328236.328110
- Jain, A., & Ross, A. A. (2004). Multibiometric systems. Communications of the ACM, 47(1), 34. https://doi.org/10.1145/962081.962102
- Karanasios, S., & Allen, D. (2014). Mobile technology in mobile work: Contradictions and congruencies in activity systems. European Journal of Information Systems, 23(5), 529–542. https://doi.org/10.1057/ejis.2014.20
- Klein, H., & Myers, M. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23(1), 67–93. https://doi.org/10.2307/249410
- Leont’ev, A. N. (1978). Activity, consciousness, and personality. Engelwood Cliffs, NJ: Princtice Hall.
- Liberatore, A. (2005). Balancing security and democracy: The politics of biometric identification in the European Union (EUI Working Papers, RSCAS). Badia Fiesolana.
- Liu, Y. (2011). Scenario study of biometric systems at borders. Computer Law & Security Review, 27(1), 36–44. 6. https://doi.org/10.1016/j.clsr.2010.11.006
- Martin, A. (2008, May 18–20). Biometrics and the United Kingdom national identity register: Exploring the privacy dilemmas of proportionality and secondary use of biometric information. 2008 International Conference on Information resources Management, Ontario, Canada.
- Martin, A. (2011). Envisioning technology through discourse: A case study of biometrics in the national identity scheme in the United Kingdom. London School of Economics and Political Science.
- Martin, A. (2012). National identity infrastructures: Lessons from the United Kingdom. In M. Hercheui, D. Whitehouse, W. McIver Jr, & J. Phahlamohlaka (Eds.), ICT critical infrastructures and society (Vol. 386, pp. 44–55). Heidelberg: Springer.
- Martin, A., & Whitley, E. (2013). Fixing identity? Biometrics and the tensions of material practices. Media, Culture and Society, 35(1), 52–60. https://doi.org/10.1177/0163443712464558
- Masiero, S. (2018). Explaining trust in large biometric infrastructures: A critical realist case study of India’s Aadhaar project. Electronic Journal of Information Systems in Developing Countries, 84(6), 1–15. https://doi.org/10.1002/isd2.12053
- McGrath, K. (2016). Identity verification and societal challenges: Explaining the gap between service provision and development outcomes. MIS Quarterly, 40(2), 485–500. https://doi.org/10.25300/MISQ/2016/40.2.12
- McGrath, K., & Maiye, A. (2010). The role of institutions in ICT innovation: Learning from interventions in a Nigerian e-government initiative. Information Technology for Development, 16(4), 260–278. https://doi.org/10.1080/02681102.2010.498408
- Miles, M., Huberman, M., & Saldana, J. (2014). Qualitative data analysis: A methods sourcebook (3rd ed.). Los Angeles: Sage.
- Myers, M. (2013). Qualitative research in business and management. London: Sage.
- Nardi, B. A. (1995). Activity theory and human-computer interaction. In B. Nardi (Ed.), Context and consciousness: Activity theory and human computer interaction (pp. 7–16). Cambridge, MA: Massachusetts Institute of Technology Press.
- Owusu-Oware, E., Effah, J., & Boateng, R. (2017). Institutional enablers and constraints of national biometric identification implementation in developing countries : The case of Ghana. AMCIS (pp. 1–10).
- Patton, M. (2015). Qualitative research and evaluation methods (4th ed.). Los Angeles: Sage.
- Piccolino, G. (2016). Infrastructural state capacity for democratization? Voter registration and identification in côte d’Ivoire and Ghana compared. Democratization, 23(3), 1–22. https://doi.org/10.1080/13510347.2014.983906
- Quansah, A., Andoh-baidoo, F., & Midha, V. (2010). Towards standardisation of E-zwich implementation: Mapping SWOT analysis to management framework models approach. International Journal of Services and Standards, 6(3–4), 195–220.
- Sarker, S., Xiao, X., Beaulieu, T., & Lee, A. S. (2018). Learning from first-generation qualitative approaches in the IS discipline: An evolutionary view and some implications for authors and evaluators (PART 1/2). Journal of the Association for Information Systems, 19(8), 752–774. https://doi.org/10.17705/1jais.00508
- Sarker, S., Xiao, X., & Beaulieu, T. (2013). Qualitative studies in information systems: A critical review and some guiding principles. MIS Quarterly, 37(4), iii–xviii. https://doi.org/10.2307/25750705
- Uzoka, F.-M., & Ndzinge, T. (2009). Empirical analysis of biometric technology adoption and acceptance in Botswana. Journal of Systems and Software, 82(9), 1550–1564. https://doi.org/10.1016/j.jss.2009.04.041
- Vygotsky, L. S. (1978). Mind in society: The development of higher psychological processes.
- Walsham, G. (1995). Interpretive case studies in IS research: Nature and method. European Journal of Information Systems, 4(2), 74–81. https://doi.org/10.1057/ejis.1995.9
- Walsham, G. (2006). Doing interpretive research. European Journal of Information Systems, 15(3), 320–330. https://doi.org/10.1057/palgrave.ejis.3000589
- Walsham, G., & Barrett, M. (2004). Making contributions from interpretive case studies: Examining processes of construction and use. In B. Kaplan, D. P. Truex, D. Wastell, A. T. Wood-Harper, & J. I. DeGross (Eds.), Information systems research (pp. 293–312). Boston: Kluwer Academic Publishers.
- Whitley, E. (2018). Trusted digital identity provision: GOV.UK Verify’s federated approach (No. CGD policy paper, 131). Washington, USA.
- Whitley, E., Gal, U., & Kjaergaard, A. (2014). Who do you think you are? A review of the complex interplay between information systems, identification and identity. European Journal of Information Systems, 23(1), 17–35. https://doi.org/10.1057/ejis.2013.34
- Whitley, E., & Hosein, G. (2010a). Global challenges for identity policies. Basingstoke: Palgrave Macmillan.
- Whitley, E., & Hosein, G. (2010b). Global identity policies and technology: Do we understand the question? Global Policy, 1(2), 209–215. https://doi.org/10.1111/j.1758-5899.2010.00028.x
- Whitley, E., Hosein, I., Angell, I., & Davies, S. (2007). Reflections on the academic policy analysis process and the UK identity cards scheme. The Information Society, 23(1), 51–58. https://doi.org/10.1080/01972240601059060
- Yadav, S., & Singh, A. K. (2013). A biometric traits based authentication system for Indian voting system. International Journal of Computer Applications, 65(15), 28–32. https://doi.org/10.5120/13285-0747
- Yin, R. (2003). Case study research, design and methods (3rd ed.). Newbury Park: Sage Publications.
- Zviran, M., & Erlich, Z. (2006). Identification and authentication: Technology and implementation issues. Communication of the Association for Information Systems, 17(Article 4), 90–105.